Odd sshd entry in auth.log

David Wolfskill david at catwhisker.org
Sat Sep 14 12:05:16 UTC 2013


My (tiny) networks at home are sitting behind a multi-homed FreeBSD
machine using IPFW & natd, with an externally-visible static /32 --
nothing particularly obscure or exotic, certainly.

The packet-filter box is configured to forward incoming ssh (22/tcp) to
my primary internal machine; in turn, that is configured to only permit
public key authentication.  Again, this isn't exactly "new and shiny"
technology.

One thing I do that may be a bit unusual is that I have the
packet-filter's IPFW rules set up so that every attempted SSH
"session-initiation" packet is logged.  I have found this ... at
least "of interest" a few times; below relates one of them.

I am in the habit of reviewing the previous day's logs while I am
running "make buildworld" ((& friends) on my laptop each morning.

This morning, I found a single entry in auth.log that -- unusually
-- was not obviously associated with any other auth.log entries; it's
the middle of:

Sep 13 11:18:38 albert sshd[43637]: Accepted publickey for david from 66.129.224.36 port 5944 ssh2
Sep 13 11:18:43 albert sshd[43654]: Accepted publickey for david from 66.129.224.36 port 24618 ssh2
Sep 13 12:43:24 albert sshd[43949]: fatal: Read from socket failed: Connection reset by peer [preauth]
Sep 13 13:10:26 albert sshd[36478]: Received disconnect from 172.17.0.254: 11: disconnected by user
Sep 13 13:10:26 albert sshd[38778]: Received disconnect from 172.17.0.254: 11: disconnected by user

So: the first couple of entries are from me accessing home from
work.  And the latter 2 entries are disconnections from my spouse's
laptop (at home).

But that middle one (this time, all by itself) seems ... odd (to me):

Sep 13 12:43:24 albert sshd[43949]: fatal: Read from socket failed: Connection reset by peer [preauth]


I don't find any other auth.log entries that seem at all related,
and that entry doesn't provide many hints about the origin of what
caused it.

If I look at /var/log/security (where the IPFW log entries go), the
closest (temporally) entries I find (that aren't better-explained
as belonging to obviously different activity are:

Sep 13 10:22:28 janus kernel: ipfw: 10000 Accept TCP 216.127.84.116:10833 172.16.8.13:22 out via dc0
Sep 13 12:43:13 janus kernel: ipfw: 10000 Accept TCP 216.127.84.116:54953 172.16.8.13:22 out via dc0


So I'm *thinking* that someone was probing a wee bit ... but I have
rather little to go on.  And while I like to think that I'm not
paranoid, I do have some reason to believe that there are definitely
folks out there who would quite willingly take advantage of an
inadequately-secured system.

It's at times like this that I kinda wish that every log entry from sshd
mentioned the IP address of the (would-be) SSH client. :-{

Comments?  Suggestions?

(I'm on the list, so I need not be Cc:ed.  Private responses will be
kept private, though.  I've set Reply-To for convenience.)

Peace,
david
-- 
David H. Wolfskill				david at catwhisker.org
Taliban: Evil cowards with guns afraid of truth from a 14-year old girl.

See http://www.catwhisker.org/~david/publickey.gpg for my public key.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-security/attachments/20130914/379f0d03/attachment.sig>


More information about the freebsd-security mailing list